-
Notifications
You must be signed in to change notification settings - Fork 280
🌱 Simplify types of Instance.SecurityGroup and Instance.Networks #1625
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
These both have a type of pointer to slice, which is: * Redundant in Go * Is marshalled identically in the CRD To verify the latter, note that there are no changes to the CRD despite the type change. Also note that the values are unused. The reason for fixing these types is that Semantic.DeepEqual can't compare them correctly so they break the fuzzer tests.
✅ Deploy Preview for kubernetes-sigs-cluster-api-openstack ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mdbooth The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
/lgtm |
/hold cancel |
um.. why the PR hold for CLA ? guess something wrong with github pipeline check now? |
/easycla |
I noticed this too and asked about it in Slack: https://kubernetes.slack.com/archives/C1TU9EB9S/p1690819437052009 TL;DR probably a blip, fixed in exactly the way you fixed it 😀 Thanks! |
These both have a type of pointer to slice, which is:
To verify the latter, note that there are no changes to the CRD despite the type change.
Also note that the values are unused.
The reason for fixing these types is that Semantic.DeepEqual can't compare them correctly so they break the fuzzer tests.
/hold